Details



A REVIEW ON CLOUD COMPUTING

Nisha Rani, Abhishek Bhatnagar

12-20

Vol. 3, Jan-Jun, 2016

Date of Submission: 2015-12-02 Date of Acceptance: 2016-01-03 Date of Publication: 2016-01-23

Abstract

There are an increasing number of Cloud Services available in the Internet. Cloud services can be a component of a system and different Cloud Servers that would provide different services. In this present work we have defined a multiple cloud environment. Each cloud server is defined with certain limits in terms of memory and the CPU specifications. Now as the users enter to the system, the user request is performed in terms of processes. To represent the parallel user requests, n number of requests are been generated by the users. All these requests are to be handled by the cloud servers in parallel by using the multiple cloud concept. A middle layer is defined between the cloud servers and the client requests that will perform the allocation of the processes to different clouds in under load and over load conditions. As user requests are performed, some parameters are also defined with each request. These parameters are the process time, deadline, input output specifications etc. In the general case, the allocations of the processes are performed in a sequential order. Each process must be executed within the deadline limit. But if more than one processes occur at same time and not get executed before the deadline, in such case the processes is switched from one cloud server to other called the process migration. In this present work, a parametric analysis is performed to identify the requirement of process migration and based on this analysis the migration will be performed on these processes. The effectiveness of the work is identified in terms of successful execution of the processes within the time limits.

References

  1. T. Hirofuchi, H. Ogawa, H. Nakada, S. Itoh, and S. Sekiguchi, ―A Storage Access Mechanism for Wide-Area Live Migration of Virtual Machines,‖ In Summer United Workshops on Parallel, Distributed and Cooperative Processing,2008, pp. 19–24.
  2. I. Foster, T. Freeman, K. Keahey, D. Scheftner, B. Sotomayor, and X. Zhang, ―Virtual Clusters for Grid Communities,‖ In IEEE Int. Symp. On Cluster Computing and the Grid, 2006, pp 513– 520.
  3. M. Strasser and H. Stamer, ―A Software-Based Trusted Platform Module Emulator,‖ In Trust ’08 Proc. of the 1st Int. Conf. on Trusted Computing and Trust in Information Technologies, 2008, pp. 33–47
  4. Y. Luo, B. Zhang, X. Wang, Z. Wang, Y. Sun, and H. Chen, ―Live and incremental whole-system migration of virtual machine using block-bitmap,‖ In IEEE Int. Conf. on Cluster Computing, 2008.
  5. H. Nishimura, N. Maruyama, and S. Matsuoka, ―Virtual Clusters on the Fly - Fast Scalable and Flexible Installation,‖ In IEEE Int. Symp. On Cluster Computing and the Grid, 2007,pp. 549–556
  6. M. Tatezono, H. Nakada, and S. Matsuoka, ―Mpi environment with load balancing using virtual machine,‖ In Symp. On Advanced Computing Systems and Infrastructures SACSIS, 2006, pp. 525–532.
  7. S. Venugopal, R. Buyya, and K. Ramamohanarao. A taxonomy of Data Grids for distributed data sharing, management, and processing. In ACM Computing Surveys, volume 38,2006
  8. A. Gopalakrishnan. 2009. Cloud Computing Identity Management. SET Labs Briefings. Vol. 7, No. 7. pp. 45-55.
  9. M. K. Srinivasan, P. Rodrigues, ―A roadmap for the comparison of identity management solutions based on state-of-the-art IdM taxonomies,‖ Springer Communications in Computer and Information Science,2010, pp. 349-358. Springer-Verlag Berlin Heidelberg, New York, USA
  10. M. K. Srinivasan, P. Rodrigues, ―Analysis on identity management systems with extended state- of-theart IdM taxonomy factors,‖ International Journal of Ad hoc, Sensor & Ubiquitous Computing. (December 2010), Vol.1, No.4. pp. 62-70. DOI=10.5121/ijasuc.2010.1406.
  11. R. Bradford, E. Kotsovinos, A. Feldmann, and H. Schi¨oberg, ―Live wide-area migration of virtual machines including local persistent state In VEE ’07,‖ Proc. of the 3rd Int. Conf. on Virtual execution environments,2007,pp. 169–179
  12. M. Shiels, ―Malicious insider attacks to rise”. BBC News, Silicon Valley, Tech. Rep. 2009.
  13. W. Baker, A. Hutton ―Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U.S. Secret Service and the Dutch High Tech Crime Unit”. Tech. Rep. Verizon, New Jersey, 2010.
  14. B. Sunderland, A. Chandramouly. ―Overcoming Security Challenges to Virtualize Iternetfacing Applications”. Intel Corporation Tech. Rep. November 2011.
  15. F. Sabahi, ―Virtualization-level security in cloud computing,‖ Proc. of IEEE Int. Conf. Communication Software and Networks, DOI: 10.1109/ICCSN.2011.6014716, 2011, pp. 250-254.
  16. L.M.Vaquero, L. Rodero-Merino, J.Caceres, M. Lindner, 2009. A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review. 39(1).
  17. W.A. Jansen, ―Cloud Hooks: Security and Privacy Issues in Cloud Computing,‖ Proc. of 44th Hawaii Int. Conf.e on System Sciences, DOI: 10.1109/HICSS.2011.103,2011,pp. 1-10.
  18. B. R. Kandukuri, V. R. Paturi, A. Rakshit, 2009. Cloud Security Issues. IEEE Computer Society. pp. 517-520. DOI 10.1109/SCC.2009.84.
  19. R. P. Padhy, M. R. Patra, S. C. Satapathy. March 2012. SLAs in Cloud Systems: The Business Perspective. International Journal of Computer Science and Technology. Vol. 3, Issue 1. pp. 481-488
  20. M. Gregg. ― Security Concerns for Cloud Computing”. Global Knowledge.Tech. Rep. 2010
  21. P. Mell, T. Grance. September 2011. The NIST Definition of Cloud Computing. NIST Special Publication 800-145. National Institute of Science and Technology.
  22. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. December 2009. Cloud Security Alliance.
  23. H. Li, J. Sedayao, J. H.Steichen, E. Jimison, C. Spence, and S. Chahal. ―Developing an Enterprise Cloud Computing Strategy” Intel Corporation,Tech. Rep. January 2009.
  24. T. Garfinkel and M. Rosenblum, ―When virtual is harder than real: security challenges in virtual machine based computing environments,‖ Proceedings of the 10th conference on Hot Topics in Operating Systems, 2005,pp. 20–20
  25. S. Berger, R. C´aceres, K. A. Goldman, R. Perez, R. Sailer, and L.V. Doorn, ― vTPM: Virtualizing the trusted platform module,‖ Proc. of the 15th conf. on USENIX Security Symp.,2006,pp. 305–320.
  26. F. Stumpf and C. Eckert, ―Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques,‖ Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies, 2008, pp.1–9
  27. P. England and J. Loeser, ―Para-Virtualized TPM Sharing,‖ Proc. of the 1st Int. Conf. on Trusted Computing and Trust in Information Technologies,2008, pp. 119–132.
  28. A.R.Sadeghi, C. St¨uble, and M. Winandy, ―Property-Based TPM Virtualization,‖ Proc. of the 11th Int. Conf. on Information Security,2008,pp.1–16.
  29. V. Scarlata, C. Rozas, M. Wiseman, D. Grawrock, and C. Vishik. TPM Virtualization: Building a General Framework. In Trusted Computing, pp. 43–56, 2007
Download PDF
Back

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

situs alexistogel

alexistogel

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

bandar alexistogel

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel slot

alexistogel

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

slot online dana

situs slot online

alexistogel

bandar togel online

slot online terpercaya

togel slot online

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

alexistogel terpercaya

rtp slot gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

daftar togel slot online

slot online gacor

trik slot bonus

prediksi togel

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 rtp

bandarbola855 link

bandarbola855 bandar

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

iosbet

iosbet

iosbet

iosbet

liatogel

login liatogel

liatogel totomacau